CVE-2022-29834
Mitsubishi Electric ICONICS GENESIS64 vulnerability analysis and mitigation

Overview

ICONICS GENESIS64 version 10.97.1 and prior contains a path traversal vulnerability (CVE-2022-29834) that allows remote unauthenticated attackers to access arbitrary files on the GENESIS64 server and disclose sensitive information stored in those files. The vulnerability was discovered in March 2022 and publicly disclosed in July 2022 (ZDI Advisory, CISA Advisory).

Technical details

The vulnerability exists within the colorpalletes endpoint of GENESIS64. When parsing the path parameter, the process does not properly validate user-supplied paths prior to using them in file operations. This path traversal vulnerability has been assigned a CVSS v3 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity with network accessibility, low attack complexity, and no required privileges or user interaction (ZDI Advisory).

Impact

Successful exploitation of this vulnerability could allow attackers to disclose stored credentials and other sensitive information, potentially leading to further system compromise. The vulnerability specifically affects the file system access controls, allowing traversal outside of restricted directories on the GENESIS64 server (CISA Advisory).

Mitigation and workarounds

ICONICS has released security updates to address this vulnerability. Users should update to GENESIS64 version 10.97.2 or later. Until updates can be applied, CISA recommends minimizing network exposure, placing control system networks behind firewalls, and isolating them from business networks. Additionally, users should restrict access to TCP ports and use secure remote access methods like VPNs when remote access is required (CISA Advisory).

Additional resources


SourceThis report was generated using AI

Related Mitsubishi Electric ICONICS GENESIS64 vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-7587HIGH7.8
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoOct 22, 2024
CVE-2022-40264HIGH7.1
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoDec 14, 2022
CVE-2024-8300HIGH7
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoNov 28, 2024
CVE-2024-1574MEDIUM6.7
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoJul 04, 2024
CVE-2024-1573MEDIUM5.9
  • Mitsubishi Electric ICONICS GENESIS64Mitsubishi Electric ICONICS GENESIS64
  • cpe:2.3:a:iconics:genesis64
NoNoJul 04, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management